Pages

Cyber Security Is Ready to Explode

Cyber Security Is Ready to Explode
DailyFinance
So why have McAfee and its main rival Symantec (NAS: SYMC) , along with other top-five cyber security companies, fallen from a 60% share of the market in 2006 to only 44% in 2010? And why have Symantec's sales declined 1.2% between the first and second ...

Oyster Creek gets thumbs up for cyber-security plan
The Star-Ledger - NJ.com
The Oyster Creek nuclear plant got approval for its new cyber-security plan to protect on-site servers against computer hackers and viruses, the Nuclear Regulatory Commission said today. "In a facility like a nuclear power plant, so much is operated ...

GAO Report Examines State Department Cybersecurity Risk Software
Security Management
By Carlton New software being used by the State Department to assess security weaknesses is helping improve real-time awareness of vulnerabilities, according to a Government Accountability Office report on information security. “Cyber-based threats to ...

Transparent cybersecurity
Plant Services
If these goals are met, you're well on your way to effective cybersecurity. Gerdau Ameristeel (www.gerdauameristeel.com), a mini-mill steel producer and steel recycler in North America with an annual manufacturing capacity of more than 10 million ..

Creating Ag Extension Agent for Cyber
GovInfoSecurity.com
Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security. Spafford, executive director of Purdue University's Center for Education and Research in Information ...

The danger of misconstruing the most serious security threats
FCW.com
By John Zyskowski Unlike in politics, it's rather important in the world of cybersecurity that words and labels mean something specific. Routinely mislabeling hacking and other incidents of computer mischief could lead to overreactions to ...

Subject Matter: New leader at the helm of AACC CyberCenter
Annapolis Capital
Kip Kunsman will oversee educational contracts for cybersecurity courses and training at AACC. He was the director at the college's Center for Workforce Solutions and has served on the Governor's Workforce Investment Board. "His extensive experience in ...

A Model Cyber Warfare School
Korea IT Times (press release)
Last month, Korea University obtained a permission to establish the Department of Cyber Security. This department will receive thirty students a year, offering a full-time scholarship. The graduates will serve in the army as officers but military ...

Greylock Partners Helps Its Start-Ups Learn 'Data Jujitsu'
Wall Street Journal (blog)
That has caused venture investors to jump on board, as VentureWire previously reported, in areas like cybersecurity and databases, not to mention social media, retail and health care. The enormous growth of data, and the ability to process it, ...

Rapid Fire: 2011-08-11
Defense Industry Daily
US debt reduction policies may also prompt European defense contractors to continue their expansion into military technologies deemed safe from spending cuts, as well as cyber-security and energy industry opportunities. EADS' first quarter results for ..

IT backbone of govt a sitting duck for China?
Times of India
Although the company did not identify the state actor in question, Indian cyber security analysts do not hesitate to name China as the principal perpetrator. So although its one entity, it's the host network for the entire Indian government. ...

China Says India and US Primary Culprits in Recent Cyber Attacks
2point6billion
Interestingly enough, the release of China's recent report came only days after US cyber securitycompany McAfee released a report uncovering the largest series of cyber-attacks caused by a “state actor” which, according to many cyber security experts, ...

Irving Burton Associates to Participate as Subcontractor to CCSi
ExecutiveBiz (blog)
The five-year multiple award will cover information technology and telecommunications services, program management, strategy planning, cybersecurity, training, and systems and software engineering. “Just as we have supported our active duty members and ...

Counterfeit IT might face new regulatory actions
FierceGovernmentIT
Federal officials have also expressed worries that counterfeit goods could cause cybersecurity problems, were they to contain malicious firmware. In June 2010, the White House called, in a strategic plan (.pdf) on intellectual property enforcement, ..

Vulnerable Insulin Pumps Demostrate Pervasive Risks
Network World
In the current economic slide, cyber security isn't a hot issue at the ballot box so don't expect anything but lip service from Washington. The only way we can force industry to deliver secure products is by a collective change in market behavior.

New CEO for Naval Institute
Annapolis Capital
Among other issues facing the Navy is continued investment in cybersecurity measures despite future spending cuts. As with fighting terrorism, modern warfare involves smaller, more fragmented targets. "We consider it a battlefield," Daly said. ...

Trying to Determine Which Anonymous to Believe
GovInfoSecurity.com
I've long maintained to get people to pay attention to IT security - whether it's pushing Congress to enact needed cybersecurity legislation or improving their own online hygiene - Facebook would have to be breached and taken offline for a period of ...

Hard-won wisdom for smart meter installations
Smart Grid News
He has worked with BGE and numerous other utilities on smart meters, smart grid data management, smart grid cyber security and other important initiatives. Jessica and Shanu put their heads together to come up with a top 10 list of major AMI challenges..

BlackBerry helps Britain's rioters organise
AFP
That's why they've been preferring to use it," said Alastair Paterson, chief executive of cybersecurity firm Digital Shadows. He said social media had proved "a very efficient tool for communicating, being able to effectively outwit the police by very ...

Have You Been Hacked This Week?
Wall Street Journal
While it is impossible to verify the full extent to which corporations have been compromised by hacking, a report this month by McAfee, a maker of cybersecurity software, suggests that "every company in every conceivable industry with significant size ...

Visiting Utah, ex-CIA boss lists top US security threats
Salt Lake Tribune... which Hayden fears could spread to the US, he identified the following as top threats and issues: the war on terror, Iran and its potential to get nuclear weapons, the need to acknowledge China's changing power and cybersecurity. ...

Fundtech Releases Results of Customer Poll
Banktech
The increased concern about fraud also comes with a belief that cyber security problems aren't being adequately addressed; 66 percent of respondents said that they believe the banking industry will never be able to get cyber crime under control. ...